Home / Vulnerability Database / Python : Weak hashing algorithm
Python

Python : Weak hashing algorithm

Overview

The hash function used is not secure. Its use may result in loss of data privacy.

Confidential data leak vulnerabilities rank third in the OWASP Top 10 2017 web application vulnerabilities.

Hash functions MD2, MD5, SHA1 have vulnerabilities. Finding collisions for MD2 and MD5 functions does not require significant resources; a similar problem was solved for SHA1. If these features are used to store valuable information (such as passwords), its confidentiality may be compromised.

The hash function used to store passwords, in addition to collision resistance, should not be too fast. This complicates the attack by exhaustive search. For this purpose, specialized hash functions have been developed: PBKDF2, bcrypt, scrypt.

Have user passwords stored on the server encrypted using an insecure hash function (such as MD5). Possible attack scenario:

  1. An attacker gains access to the encrypted password database.
  2. An attacker, using a hashing algorithm vulnerability, calculates a string for which the hashing algorithm gives the same value as for the user’s password.
  3. The attacker authenticates using the computed string.
CRITICAL

DerScanner Severity Score

Do you want to fix Python : Weak hashing algorithm in your application?

See also

Python

Python : Debug mode on

Python

Python : Web3: Deprecated method

Python

Python : Unsafe padding